| [1]Wang Liangliang, Xu Jiangwei, Qin Baodong, et al. An efficient fuzzy certificateless signaturebased authentication scheme using anonymous biometric identities for VANETs[J]. IEEE Trans on Dependable and Secure Computing, 2024, 22(1): 292307[2]Zhang Jing, Su Shuangshuang, Zhong Hong, et al. Identitybased broadcast proxy reencryption for flexible data sharing in VANETs[J]. IEEE Trans on Information Forensics and Security, 2023, 18: 48304842[3]Yang Xiaodong, Li Songyu, Yang Lan, et al. Efficient and securityenhanced certificateless aggregate signaturebased authentication scheme with conditional privacy preservation for VANETs[J]. IEEE Trans on Intelligent Transportation Systems, 2024, 25(9): 1225612268[4]徐元杰, 吴建华, 龚一轩. 简析车联网网络安全[J].信息安全研究, 2024, 10(E2): 139143[5]Gentry C. Certificatebased encryption and the certificate revocation problem[C] Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 272293[6]Kang B G, Park J H, Hahn S G. A certificatebased signature scheme[C] Proc of Cryptographers’ Track at the RSA Conference. Berlin: Springer, 2004: 99111[7]Li Jiguo, Huang Xinyi, Mu Yi, et al. Certificatebased signature: Security model and efficient construction[C] Proc of Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice(EuroPKI 2007). Berlin: Springer, 2007: 110125[8]Liu Min, Wang Liangliang, Zhang Kai, et al. A pairingfree certificatebased keyinsulated aggregate signature scheme for wireless medical sensor networks[J]. PeertoPeer Networking and Applications, 2024, 17(2): 685700[9]安浩杨, 何德彪, 包子健, 等. 一种基于证书的数字签名方案[J]. 信息网络安全, 2023, 23(3): 1321[10]Verma G K, Kumar N, Gope P, et al. SCBS: A short certificatebased signature scheme with efficient aggregation for industrialInternetofthings environment[J]. IEEE Internet of Things Journal, 2021, 8(11): 93059316[11]Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications[C] Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1996: 143154[12]Lipmaa H, Wang Guiling, Bao Feng. Designated verifier signature schemes: Attacks, new security notions and a new construction[G] LNCS 3580: Proc of the 32nd Int Colloquium on Automata, Languages and Programming. Berlin: Springer, 2005: 459471[13]Shen Limin, Ma Jiafeng, Miao Yinbin, et al. Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model[J]. IET Information Security, 2019, 13(3): 167173[14]Li Tian, Wang Huaqun, He Debiao, et al. Designatedverifier aggregate signature scheme with sensitive data privacy protection for permissioned blockchainassisted IIoT[J]. IEEE Trans on Information Forensics and Security, 2023, 18: 46404651[15]Deng Lunzhi, Wang Tao, Feng Shuai, et al. Secure identitybased designated verifier anonymous aggregate signature scheme suitable for smart grids[J]. IEEE Internet of Things Journal, 2022, 10(1): 5765[16]李继国, 方淳. 基于SM9的指定验证者聚合签名方案[J]. 网络与信息安全学报, 2024, 10(4): 6371 |